[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH v2] tools/xenconsoled: Increase file descriptor limit



On Tue, Feb 17, 2015 at 04:21:24PM +0000, Andrew Cooper wrote:
> XenServer's VM density testing uncovered a regression when moving from
> sysvinit to systemd where the file descriptor limit dropped from 4096 to
> 1024. (XenServer had previously inserted a ulimit statement into its
> initscripts.)
> 
> One solution is to use LimitNOFILE=4096 in xenconsoled.service to match the
> lost ulimit, but that is only a stopgap solution.
> 
> As Xenconsoled genuinely needs a large number of file descriptors if a large
> number of domains are running, and is well behaved with its descriptors,
> attempt to up the limit to the system maximum.
> 
> Signed-off-by: Andrew Cooper <andrew.cooper3@xxxxxxxxxx>
> CC: Ian Campbell <Ian.Campbell@xxxxxxxxxx>
> CC: Ian Jackson <Ian.Jackson@xxxxxxxxxxxxx>
> CC: Wei Liu <wei.liu2@xxxxxxxxxx>
> 
> ---
> v2:
>  * Always increase soft limit to hard limit
>  * Correct commment regarding number of file descriptors
>  * long -> unsigned long as that appears to be the underlying type of an 
> rlim_t
> ---
>  tools/console/daemon/main.c |   45 
> +++++++++++++++++++++++++++++++++++++++++++
>  1 file changed, 45 insertions(+)
> 
> diff --git a/tools/console/daemon/main.c b/tools/console/daemon/main.c
> index 92d2fc4..0bb9d8a 100644
> --- a/tools/console/daemon/main.c
> +++ b/tools/console/daemon/main.c
> @@ -26,6 +26,7 @@
>  #include <string.h>
>  #include <signal.h>
>  #include <sys/types.h>
> +#include <sys/resource.h>
>  
>  #include "xenctrl.h"
>  
> @@ -55,6 +56,48 @@ static void version(char *name)
>       printf("Xen Console Daemon 3.0\n");
>  }
>  
> +/*
> + * Xenconsoled requires two file descriptors for each PV console (pty and log
> + * file), which can easily exceed the default of 1024 if many guests are
> + * running.  Try to set the fd limit to the system maximum, falling back to a
> + * default of 4096.
> + */
> +static void increase_fd_limit(void)
> +{
> +     FILE *fs_nr_open;
> +     struct rlimit lim;
> +     unsigned long nr_open = 4096;
> +
> +     if (getrlimit(RLIMIT_NOFILE, &lim) < 0)
> +             return;
> +
> +     /* Increase the soft limit to the current hard limit. */
> +     if (lim.rlim_cur < lim.rlim_max) {
> +             lim.rlim_cur = lim.rlim_max;
> +             if (setrlimit(RLIMIT_NOFILE, &lim) < 0)
> +                     return;
> +     }
> +
> +     /* Attempt to locate the system maximum. */
> +     fs_nr_open = fopen("/proc/sys/fs/nr_open", "r");
> +     if (fs_nr_open) {
> +             unsigned long nr;
> +
> +             if (fscanf(fs_nr_open, "%lu", &nr) == 1)
> +                     nr_open = nr;
> +             fclose(fs_nr_open);
> +     }
> +
> +     /*
> +      * In the likely case that we are a root process with
> +      * CAP_SYS_RESOURCE, attempt to up our hard limit.
> +      */
> +     if (nr_open > lim.rlim_max) {
> +             lim.rlim_cur = lim.rlim_max = nr_open;
> +             setrlimit(RLIMIT_NOFILE, &lim);
> +     }
> +}
> +

This function looks Linux centric (/proc and CAP_SYSRESOURCE). Please be
considerate to other Unices. :-)

Also you might want to log failures along the line.

Wei.

>  int main(int argc, char **argv)
>  {
>       const char *sopts = "hVvit:o:";
> @@ -154,6 +197,8 @@ int main(int argc, char **argv)
>       openlog("xenconsoled", syslog_option, LOG_DAEMON);
>       setlogmask(syslog_mask);
>  
> +     increase_fd_limit();
> +
>       if (!is_interactive) {
>               daemonize(pidfile ? pidfile : "/var/run/xenconsoled.pid");
>       }
> -- 
> 1.7.10.4

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.